Changeset 178693 in webkit for trunk/Source/JavaScriptCore/jit
- Timestamp:
- Jan 19, 2015, 9:01:26 PM (10 years ago)
- Location:
- trunk/Source/JavaScriptCore/jit
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/JavaScriptCore/jit/ClosureCallStubRoutine.cpp
r172176 r178693 1 1 /* 2 * Copyright (C) 2012, 2014 Apple Inc. All rights reserved.2 * Copyright (C) 2012, 2014, 2015 Apple Inc. All rights reserved. 3 3 * 4 4 * Redistribution and use in source and binary forms, with or without … … 40 40 ClosureCallStubRoutine::ClosureCallStubRoutine( 41 41 const MacroAssemblerCodeRef& code, VM& vm, const JSCell* owner, 42 ExecutableBase* executable , const CodeOrigin& codeOrigin)42 ExecutableBase* executable) 43 43 : GCAwareJITStubRoutine(code, vm) 44 44 , m_executable(vm, owner, executable) 45 , m_codeOrigin(codeOrigin)46 45 { 47 46 } -
trunk/Source/JavaScriptCore/jit/ClosureCallStubRoutine.h
r172176 r178693 1 1 /* 2 * Copyright (C) 2012, 2014 Apple Inc. All rights reserved.2 * Copyright (C) 2012, 2014, 2015 Apple Inc. All rights reserved. 3 3 * 4 4 * Redistribution and use in source and binary forms, with or without … … 38 38 ClosureCallStubRoutine( 39 39 const MacroAssemblerCodeRef&, VM&, const JSCell* owner, 40 ExecutableBase* , const CodeOrigin&);40 ExecutableBase*); 41 41 42 42 virtual ~ClosureCallStubRoutine(); 43 43 44 44 ExecutableBase* executable() const { return m_executable.get(); } 45 const CodeOrigin& codeOrigin() const { return m_codeOrigin; }46 45 47 46 protected: … … 50 49 private: 51 50 WriteBarrier<ExecutableBase> m_executable; 52 // This allows us to figure out who a call is linked to by searching through53 // stub routines.54 CodeOrigin m_codeOrigin;55 51 }; 56 52 -
trunk/Source/JavaScriptCore/jit/Repatch.cpp
r178441 r178693 1 1 /* 2 * Copyright (C) 2011 , 2012, 2013, 2014Apple Inc. All rights reserved.2 * Copyright (C) 2011-2015 Apple Inc. All rights reserved. 3 3 * 4 4 * Redistribution and use in source and binary forms, with or without … … 1732 1732 toCString(*callerCodeBlock).data(), callLinkInfo.callReturnLocation.labelAtOffset(0).executableAddress(), 1733 1733 codePtr.executableAddress(), toCString(pointerDump(calleeCodeBlock)).data())), 1734 *vm, callerCodeBlock->ownerExecutable(), executable , callLinkInfo.codeOrigin));1734 *vm, callerCodeBlock->ownerExecutable(), executable)); 1735 1735 1736 1736 RepatchBuffer repatchBuffer(callerCodeBlock);
Note:
See TracChangeset
for help on using the changeset viewer.